We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an electrical transmission system. We conclude by reporting insights gained from the modeling experience and many “red-team ” exercises. Each exercise gathers open-source data on a real-world infrastructure system, develops an appropriate bilevel or trilevel model, and uses these to identify vulnerabilities in the system or to plan an optimal defense. Key w...
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.Cyberattacks against critical infr...
PDFOrganization InfoPolicyNational securityInfrastructureGuidelinesTerrorismUnited StatesUnited Stat...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004.Includes bi...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252We des...
Abstract This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan d...
Critical infrastructures underpin the domestic security, health, safety and economic well being of t...
How to best allocate resources to minimize the consequences of terrorist attacks is an important and...
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one ...
How do we identify and prioritize risks and make smart choices based on fiscal constraints and limit...
Abstract In this tutorial, we quantify resilience for an infrastructure system to a set of disruptiv...
Abstract In this tutorial, we quantify resilience for an infrastructure system to a set of disruptiv...
Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been...
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.Cyberattacks against critical infr...
PDFOrganization InfoPolicyNational securityInfrastructureGuidelinesTerrorismUnited StatesUnited Stat...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004.Includes bi...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient...
Abstract We describe new bilevel programming models to (1) help make the country’s criti-cal infrast...
The article of record as published may be located at http://dx.doi.org//10.1287/inte.1060.0252We des...
Abstract This paper (a) describes a defender-attacker-defender sequential game model (DAD) to plan d...
Critical infrastructures underpin the domestic security, health, safety and economic well being of t...
How to best allocate resources to minimize the consequences of terrorist attacks is an important and...
Vulnerability to sudden service disruptions due to deliberate sabotage and terrorist attacks is one ...
How do we identify and prioritize risks and make smart choices based on fiscal constraints and limit...
Abstract In this tutorial, we quantify resilience for an infrastructure system to a set of disruptiv...
Abstract In this tutorial, we quantify resilience for an infrastructure system to a set of disruptiv...
Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been...
Reissued 27 Sep 2018 to reflect updated abstract on pages i and v.Cyberattacks against critical infr...
PDFOrganization InfoPolicyNational securityInfrastructureGuidelinesTerrorismUnited StatesUnited Stat...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004.Includes bi...